Transcript
Dave Buettner (0:02)
You're listening to the Cyberwire Network powered by N2K. We've all been there. You realize your business needs to hire someone yesterday. How can you find amazing candidates fast? Well, it's easy. Just use Indeed when it comes to hiring, Indeed is all you need. Stop struggling to get your job post noticed Indeed. Sponsored Jobs helps you stand out and hire fast. Your post jumps to the top of search results so the right candidates see it first and it works. Sponsored Jobs on indeed get 45% more applications than non sponsored ones. One of the things I love about Indeed is how fast it makes hiring. And yes, we do actually use Indeed for hiring here at N2K CyberWire. Many of my colleagues here came to us through Indeed. Plus with Sponsored Jobs. There are no subscriptions, no long term contracts. You only pay for results. How fast is Indeed? Oh, in the minute or so that I've been Talking to you, 23 hires were made on Indeed according to Indeed Data Worldwide. There's no need to wait any longer. Speed up your hiring right now with Indeed and listeners to this show will get a $75 sponsored job credit. To get your jobs more visibility at indeed.com cyberwire just go to indee indeed.com cyberwire right now and support our show by saying you heard about Indeed on this podcast. Indeed.com cyberwire terms and conditions apply. Hiring Indeed is all you need. PHP exploits are active in the wild Security researchers discover undocumented commands in a popular Wi fi and Bluetooth enabled microcontroller. The ONCD could gain influence in this second Trump administration. The Akira ransomware gang leverages an unsecured webcam mission Texas declares a state of emergency following a cyber attack. The FBI and Secret Service confirm crypto heists are linked to the 2022 LastPass breach. A popular home appliance manufacturer suffers a cyber attack. Switzerland updates reporting requirements for critical infrastructure operators. Our guest is Errol Weiss, chief security Officer at the Health isac, who warns the cavalry isn't coming and why the private sector must take the lead in critical infrastructure cybersecurity and a termination kill switch leads to potential jail time. Foreign March 10, 2025 I'm Dave Buettner and this is your Cyberwire Intel Briefing. Happy Monday everyone. It is great to be back from a restful family vacation. Thanks to Maria Vermazes for filling in on the mic for me and to our entire production team for making it possible for me to be away without skipping a beat. Threat actors are actively exploiting a critical PHP vulnerability to execute remote code on Windows servers running Apache and PHP CGI with specific code page settings. The flaw arises from PHP's failure to handle Unicode best fit conversion properly, allowing attackers to manipulate character sequences into PHP options. The vulnerability was publicly disclosed in June of last year, with ransomware groups launching attacks within days. Cisco later reported targeted attacks on Japanese organizations across multiple sectors using Cobalt Strike based tools for persistence and privilege escalation. Now Gray Noise warns that exploitation has gone global, with spikes in the us, uk, Singapore, India and others. In January of this year alone, over 1000 unique IPs attempted attacks. Germany and China account for over 43% of malicious IPs. All PHP versions on Windows are affected, but fixes have been released and users should update immediately to mitigate risks. Security researchers have discovered undocumented commands in the ESP32 microchip, a popular Wi Fi and Bluetooth enabled microcontroller used in over 1 billion devices. These hidden commands found by tarlogic security, could allow attackers to spoof trusted devices, access unauthorized data, pivot to other devices and establish long term persistence. The issue stems from 29 vendor specific Bluetooth commands that enable memory manipulation, Mac address spoofing and packet injection. These could be exploited for malicious firmware, supply chain attacks or advanced Bluetooth based threats. Expressif, the chip's manufacturer, has not publicly documented these commands, leaving questions about whether they were intentional or an oversight. While remote exploitation is possible, physical access poses a greater risk. Researchers warn that compromised ESP32 chips could serve as a launchpad for persistent cyber attacks on IoT devices, mobile phones and even medical equipment. Expressif has yet to comment. The Office of the National Cyber Director is expected to gain significant influence in a second Trump administration, fulfilling the leadership role Congress envisioned when it was created in 2021. Sean Cairncross, a Trump loyalist with no cybersecurity background, is expected to lead the office, bringing strong political ties that could enhance its authority over cyber policy across the executive branch. Experts say ONCD will take a central role, guiding both offensive cyber efforts and domestic defense. The NSC's cyber team, now focused on offensive cyber operations, will complement ONCD's leadership in cyber crisis management. Analysts predict deregulation will be a key ONCD initiative. With reduced cyber staffing at NSC and no Ann Neuberger like figure, ONCD may finally become the executive branch's primary cyber authority, a role it struggled to achieve under Biden's administration. The Akira ransomware gang leveraged an unsecured webcam to encrypt a victim's network, bypassing endpoint detection and Response, which had blocked their Windows encryptor. Cybersecurity firm SRM discovered this unconventional method during an incident response. Akira initially gained access through an exposed remote access solution, likely via stolen credentials or brute force attacks. They installed anydesk, stole data for double extortion, and used remote desktop protocol to spread before deploying ransomware. When EDR blocked their payload, they scanned for alternative attack vectors and found a vulnerable Linux based webcam. Since the webcam lacked EDR protection, they used it to mount Windows SMB network shares and launch their Linux encryptor, successfully encrypting network files. This attack highlights the security risks of IoT devices, emphasizing the need for network segmentation, regular firmware updates, and stronger monitoring of non traditional endpoints to prevent exploitation. The city of Mission, Texas declared a state of emergency after a cyberattack exposed all city government data and forced systems offline. Officials assured that emergency services remained operational, but reports suggest police lost access to state databases for license and ID checks. Mayor Nori Gonzalez Garza urged governor Greg Abbott to declare a statewide emergency to unlock disaster funds. The attack, which began Feb. 28, is under law enforcement investigation. Texas cities have faced multiple ransomware attacks in recent months, disrupting hospitals, utilities and local governments. Mission joins Matagorda County, McKinney, Capell and Richardson in suffering cyber incidents Krebson Security first reported in September 2023 that a wave of high value crypto heists stemmed from the 2022 LastPass breach. Now US federal investigators confirm that a $150 million cyber heist in January of 2024 targeting Ripple Co founder Chris Larson was executed using stolen LastPass master passwords. The FBI and Secret Service support Krebs findings stating attackers cracked poorly secured vaults to steal victims. Cryptocurrency seed phrases stored in LastPass Secure notes. $24 million in stolen funds have been seized, but thefts continue globally despite mounting evidence. LastPass denies definitive links to the thefts. Experts criticized LastPass for failing to warn users and enforce better security. Cybersecurity experts stress that these attacks could have been prevented, and new thefts show the threat remains active more than two years after the breach. NATIONAL Presto Industries, maker of popular home appliances like air fryers, reported a cyber attack disrupting shipping, manufacturing and back office functions since March 1st. The Wisconsin based company disclosed the incident in an SEC filing stating it is working to restore operations and has notified law enforcement. The attack's impact on Presto's military contracting division is unclear. Forensic analysis is ongoing and no cybercriminal group has claimed responsibility. The company warned that the breach could affect its financial performance, but has implemented temporary measures to maintain critical functions. Starting April 1, Switzerland will require critical infrastructure operators to report cyber attacks to the National CyberSecurity center within 24 hours. This mandate, part of an amendment to the Information Security act, applies to energy, water, transport and government entities. If an attack disrupts operations, leaks data or involves blackmail, reports must be completed within 14 days and fines may apply for non compliance. A grace period lasts until October 1. Similar laws exist worldwide, including in the US, UK, EU and Australia. Coming up after the break, Errol Weiss from the Health ISAC warns that the cavalry isn't coming and a termination kill switch leads to potential jail time. Stay with us. Foreign cyber threats are more sophisticated than ever. Passwords. They're outdated and can be cracked in a minute. Cybercriminals are intercepting SMS codes and bypassing authentication apps. While businesses invest in network security, they often overlook the front door. The login Yubico believes the future is passwordless. Yubikeys offer unparalleled protection against phishing for individuals, SMBs and enterprises. They deliver a fast, frictionless experience that users love. Yubico is offering N2K followers a limited buy one, get one offer. Visit yubico.com N2K to unlock this deal. That's Yubico. Say no to modern cyber threats. Upgrade your security today. Foreign do you know the status of your compliance controls right now? Like right now, we know that real time visibility is critical for security, but when it comes to our GRC programs, we rely on point in time checks. But get this, more than 8,000 companies like Atlassian and Quora have continuous visibility into their controls with Vanta. Here's the gist. Vanta brings automation to evidence collection across 30 frameworks like SoC2 and ISO 27001. They also centralize key workflows like policies, access reviews and reporting, and helps you get security questionnaires done five times faster with AI. Now that's a new way to GRC. Get $1,000 off Vanta when you go to vanta.com cyber that's vanta.com cyber for $1,000 off. Errol Weiss is Chief Security Officer at the Health isac. I recently sat down with him to discuss why the cavalry is not coming and why the private sector must take the lead in critical infrastructure cybersecurity.
